{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T07:47:46Z","timestamp":1773388066810,"version":"3.50.1"},"reference-count":80,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icbc59979.2024.10634439","type":"proceedings-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T22:53:39Z","timestamp":1724280819000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["SoK: Cryptocurrency Wallets \u2013 A Security Review and Classification based on Authentication Factors"],"prefix":"10.1109","author":[{"given":"Ivan","family":"Homoliak","sequence":"first","affiliation":[{"name":"Brno University of Technology,Faculty of Information Technology"}]},{"given":"Martin","family":"Pere\u0161\u00edni","sequence":"additional","affiliation":[{"name":"Brno University of Technology,Faculty of Information Technology"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Brain wallets are not secure and \u2018no one should use them,\u2019 says study","author":"Buntinx","year":"2016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1515\/tmmp-2016-0030"},{"key":"ref3","article-title":"Binance Security Breach Update","year":"2019"},{"key":"ref4","article-title":"Crypto Exchange BitMart Hacked With Losses Estimated at $196M","year":"2021"},{"key":"ref5","article-title":"The aftermath of Axie Infinitys \u2019$650M Ronin Bridge hack","year":"2022"},{"key":"ref6","article-title":"CoinEx hack: Compromised private keys led to $70M theft","year":"2023"},{"key":"ref7","article-title":"Kraken Identifies Critical Flaw in Trezor Hardware Wallets","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23015"},{"key":"ref9","article-title":"Securing bitcoin wallets via a new dsa\/ecdsa threshold signature scheme","author":"Goldfeder","year":"2015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"ref11","article-title":"Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets","author":"Erinle","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3596906"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCSP49186.2020.9315193"},{"key":"ref14","article-title":"Sok: A taxonomy of cryptocurrency wallets","author":"Karantias","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref15","article-title":"Cryptocurrency-stealing malware landscape","year":"2015","journal-title":"Dell SecureWorks"},{"key":"ref16","article-title":"Cyren sounds siren over bitcoin siphon scam","author":"Peyton","year":"2017","journal-title":"FinTech Futures"},{"key":"ref17","article-title":"Kraken Identifies Critical Flaw in Trezor Hardware Wallets","year":"2020"},{"key":"ref18","article-title":"Inside Kraken Security Labs: Flaw Found in Keepkey Crypto Hardware Wallet","year":"2019"},{"key":"ref19","article-title":"Extracting seed from Ellipal wallet","author":"Team","year":"2019"},{"key":"ref20","article-title":"Ledger Nano","year":"2018"},{"key":"ref21","first-page":"1511","article-title":"Man-in-the-machine: exploiting ill-secured communication inside the computer","volume-title":"27th USENIX Security Symposium (USENIX Security 18).","author":"Bui"},{"key":"ref22","article-title":"Coinbase","year":"2020"},{"key":"ref23","article-title":"Binance","year":"2020"},{"key":"ref24","article-title":"Poloniex","year":"2020"},{"key":"ref25","article-title":"Kraken","year":"2020"},{"key":"ref26","article-title":"Luno wallet","year":"2019"},{"key":"ref27","article-title":"Paxful","year":"2020"},{"key":"ref28","article-title":"Bithumb $31 Million Crypto Exchange Hack: What We Know (And Don\u2019t)","author":"Zhao","year":"2018"},{"key":"ref29","article-title":"Trading Site Failure Stirs Ire and Hope for Bitcoin","author":"Abrams","year":"2014"},{"key":"ref30","article-title":"Bitcoin Worth $72M Was Stolen in Bitfinex Exchange Hack in Hong Kong","year":"2016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"ref33","article-title":"Mycelium wallet","year":"2019"},{"key":"ref34","article-title":"Multi Signature Online Cryptocurrency Wallet","year":"2019"},{"key":"ref35","article-title":"Citowise wallet","year":"2019"},{"key":"ref36","article-title":"Coinomi Wallet","year":"2019"},{"key":"ref37","article-title":"Infinito wallet","year":"2019"},{"key":"ref38","article-title":"Embedded Wallet","year":"2024"},{"key":"ref39","article-title":"Beam \u2013 Amazon Checkout","year":"2024"},{"key":"ref40","article-title":"Mycelium Entropy","year":"2019"},{"key":"ref41","article-title":"Zengo Wallet Security","year":"2024"},{"key":"ref42","article-title":"Bitcoin Armory","year":"2016"},{"key":"ref43","article-title":"Electrum Bitcoin wallet","year":"2019"},{"key":"ref44","article-title":"TrustedCoin cosigning service","year":"2019"},{"key":"ref45","article-title":"Bitpay Wallet (formerly Copay)","year":"2024"},{"key":"ref46","article-title":"TrezorMultisig2of3","year":"2019"},{"key":"ref47","article-title":"Parity Wallet","year":"2019"},{"key":"ref48","article-title":"Gnosis Wallet","year":"2019"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref50","article-title":"Bitcoin Core","year":"2019"},{"key":"ref51","article-title":"MyEtherWallet","year":"2019"},{"key":"ref52","article-title":"Bitcoin Hardware Wallet Interface","author":"Chow","year":"2024"},{"key":"ref53","article-title":"Bitcoin Wallet","year":"2019"},{"key":"ref54","article-title":"Deterministic wallets","author":"Maxwell","year":"2011"},{"key":"ref55","article-title":"BIP 0032 \u2013 Hierarchical deterministic wallets","year":"2012"},{"key":"ref56","article-title":"MetaMask","year":"2019"},{"key":"ref57","article-title":"Daedalus Wallet","year":"2019"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_36"},{"key":"ref59","article-title":"Trezor","year":"2019"},{"key":"ref60","article-title":"Ledger Nano S","year":"2019"},{"key":"ref61","article-title":"The Simple Cryptocurrency Hardware Wallet","year":"2019"},{"key":"ref62","article-title":"BitLox wallet","year":"2019"},{"key":"ref63","article-title":"ELLIPAL Hardware Wallet 2.0","year":"2019"},{"key":"ref64","article-title":"The CoolWallet S","year":"2019"},{"key":"ref65","article-title":"BitBox hardware wallet","year":"2019"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_8"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref69","article-title":"The Multi-sig Hack: A Postmortem","year":"2017"},{"key":"ref70","article-title":"A Postmortem on the Parity Multi-Sig Library Self-Destruct","year":"2017"},{"key":"ref71","article-title":"Argent wallet","year":"2024"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423257"},{"key":"ref73","article-title":"Okx wallet","year":"2017"},{"key":"ref74","article-title":"Bitfinex wallet","author":"iFinex","year":"2013"},{"key":"ref75","article-title":"Bitcoin (BTC) Wallet","year":"2024"},{"key":"ref76","article-title":"Blockchain DeFi Wallet","year":"2024"},{"key":"ref77","article-title":"Bitfinex wallet","year":"2024"},{"key":"ref78","article-title":"The OAuth 2.0 Authorization Framework: Bearer Token Usage","author":"Jones","year":"2012","journal-title":"Internet Requests for Comments"},{"key":"ref79","article-title":"Beam wallet brings Amazon and Shopify purchases to users","year":"2024"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_18"}],"event":{"name":"2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Dublin, Ireland","start":{"date-parts":[[2024,5,27]]},"end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10634319\/10634334\/10634439.pdf?arnumber=10634439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T04:13:29Z","timestamp":1725250409000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634439\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/icbc59979.2024.10634439","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}